Security Evaluation of Sensor Networks

  • Horia AndreiEmail author
  • Marian Gaiceanu
  • Marilena Stanculescu
  • Ioan Marinescu
  • Paul Cristian Andrei
Part of the Studies in Systems, Decision and Control book series (SSDC, volume 255)


Traditional industrial control systems (ICS) were implemented especially for isolated system and used specialized hardware and software control protocols. Along with development of low-cost Internet Protocol (IP) devices, the ICS adopting new information technologies (IT) solutions to promote systems connectivity and data communication.


Control systems Sensor networks Security analysis Defense solutions 


  1. 1.
    Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security, 2015, NIST Special Publication 800-82 (2015)Google Scholar
  2. 2.
    Peterson, D.: Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks, ISA (2004)Google Scholar
  3. 3.
    Diaz, A., Sanchez, P.: Simulation of attacks for security in wireless sensor network. Sensors 16, 2–27 (2016)Google Scholar
  4. 4.
    Shukla, J., Babli Kumari, K.: Security threats and defense approaches in wireless sensor networks: an overview. IJAIEM 2, 165–175 (2013)Google Scholar
  5. 5.
    Jinghua, Z.: Wireless sensor network technology based on security trust evaluation model. iJOE 14(4), 211–226 (2018)Google Scholar
  6. 6.
    Singh, J.: Security issues in wireless sensor networks (wsn). Lect. Notes Eng. Comput. Sci. 2170(1), 40–45 (2015)Google Scholar
  7. 7.
    Marinescu, I., Botea, B., Andrei, H.: Critical infrastructure risk assessment of Romanian power systems. In: Proceedings of IEEE-ISEEE Conference (2017)Google Scholar
  8. 8.
    Esfahani, P.M., Vrakopuolou, M., Margellos, K., Lygeros, J., Andersson, G.: Cyber attack in a two-area power system: impact identification using reachability. In: Proceedings of American Control Conference (2010)Google Scholar
  9. 9.
  10. 10.
  11. 11.
    “North American Electric Reliability Council, Technical Analysis of the August 14, 2003, Blackout: What Happened, Why, and What Did We Learn?”, North American Electric Reliability Council (2004)Google Scholar
  12. 12.
    Smith, R.: Assault on California power station raises alarm on potential for terrorism. Wall Street J. (2014)Google Scholar
  13. 13.
    Zetter, K.: Inside the cunning, unprecedented hack of Ukraine’s Power Grid (2016).
  14. 14.
  15. 15.
    TLP: White Analysis of the Cyber Attack on the Ukrainian Power Grid (2016).
  16. 16.
    Greenberg, A.: Crash override: the malware that took down a power grid (2017).
  17. 17.
    Lee, R.M.: Crashoverride: Analyzing the Malware that Attacks Power Grids.
  18. 18.
    Osborne, C.: Industroyer: An in-Depth look at the Culprit Behind Ukraine’s Power Grid Blackout (2018).
  19. 19.
    Maduro, N.: Presents Details of Attacks Against Electrical System in Venezuela (2019).
  20. 20.
    Teruggi, M.: New Sabotage and Power Outage in Venezuela March 25–26 (2019).
  21. 21.
    Andrei, A., Stănculescu, M.: Cryptography versus Cryptanalysis (in Romanian: Criptografie versus critpanaliza). Ed. Printech (2014)Google Scholar
  22. 22.
    Deaconu, I.D., Stănculescu, M., Chirilă, A. I., Năvrăpescu, V., Andrei, H.: On automatic transfer switch system security. In: Proceedings of IEEE-International Conference on Applied and Theoretical Electricity (ICATE) (2018)Google Scholar
  23. 23.
    De Moura, L., Bjorner, N.: Z3: An efficient SMT solver. In: Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS’08/ETAPS’08 (2008)Google Scholar
  24. 24.
  25. 25.
  26. 26. Scholar
  27. 27.
    Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyberphysical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)CrossRefGoogle Scholar
  28. 28.
    Pasqualetti, F., D̈orfler, F., Bullo, F.: Cyber-physical attacks in power networks: models, fundamental limitations and monitor design. In: Proceedings of IEEE-Conference on Decision and Control, and European Control Conference (2011)Google Scholar
  29. 29.
    Mahdi, M., El-Arini, M., Fathy, A.: Identification of coherent generators using fuzzy C-means clustering algorithm and construction of dynamic equivalent of power system. J. Electr. Syst. 6(2), 2–18 (2010)Google Scholar
  30. 30.
    Shoukry, Y., Chong, M., Wakaiki, M., Nuzzo, P., Puggelli, A., Sangiovanni-Vincentelli, A., Seshia, S., Hespanha, J., Tabuado, P.: SMT-Based observer design for cyber-physical systems under sensor attacks. ACM Trans. Cyber-Phys Syst 2(1), 36–50 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Horia Andrei
    • 1
    Email author
  • Marian Gaiceanu
    • 2
  • Marilena Stanculescu
    • 3
  • Ioan Marinescu
    • 1
  • Paul Cristian Andrei
    • 3
  1. 1.Doctoral School of Engineering SciencesUniversity Valahia TargovisteTargovisteRomania
  2. 2.Department of Control Systems and Electrical EngineeringDunarea de Jos University of GalatiGalatiRomania
  3. 3.Department of Electrical EngineeringUniversity Politehnica BucharestBucharestRomania

Personalised recommendations